Question 731

Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?
  • Question 732

    Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?
  • Question 733

    A finance department director has decided to outsource the organization's budget application and has identified potential providers. Which of the following actions should be initiated FIRST by the information security manager?
  • Question 734

    An organization determines that an end-user has clicked on a malicious link. Which of the following would MOST effectively prevent similar situations from recurring?
  • Question 735

    Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?